Next Article in Journal
M-SAC-VLADNet: A Multi-Path Deep Feature Coding Model for Visual Classification
Previous Article in Journal
Entropy in Nanofluids
Previous Article in Special Issue
Polar Codes for Covert Communications over Asynchronous Discrete Memoryless Channels
Open AccessArticle

Secure and Reliable Key Agreement with Physical Unclonable Functions

1
Chair of Communications Engineering, Technical University of Munich, 80333 Munich, Germany
2
Associate Professorship of Line Transmission Technology, Technical University of Munich, 80333 Munich, Germany
3
Huawei Technologies Duesseldorf GmbH, 80992 Munich, Germany
4
Information Theory and Applications Chair, Technische Universität Berlin, 10587 Berlin, Germany
*
Author to whom correspondence should be addressed.
Parts of this paper were presented at the 2016 IEEE Global Conference on Signal and Information Processing (Washington, DC, USA, 7–9 December 2016) and 2017 IEEE International Conference on Communications (Paris, France, 21–25 May 2017).
Entropy 2018, 20(5), 340; https://doi.org/10.3390/e20050340
Received: 25 March 2018 / Revised: 17 April 2018 / Accepted: 27 April 2018 / Published: 3 May 2018
(This article belongs to the Special Issue Information-Theoretic Security)
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area. View Full-Text
Keywords: key agreement; physical unclonable functions; transform coding; privacy leakage; hardware implementation key agreement; physical unclonable functions; transform coding; privacy leakage; hardware implementation
Show Figures

Figure 1

MDPI and ACS Style

Günlü, O.; Kernetzky, T.; İşcan, O.; Sidorenko, V.; Kramer, G.; Schaefer, R.F. Secure and Reliable Key Agreement with Physical Unclonable Functions. Entropy 2018, 20, 340.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop